SB2019091656 - Buffer overflow in asterisk (Alpine package)
Published: September 16, 2019
Security Bulletin ID
SB2019091656
Severity
Medium
Patch available
YES
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Denial of service
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Buffer overflow (CVE-ID: CVE-2018-19278)
The vulnerability allows a remote attacker to cause DoS condition on the target system.The weakness exists due to buffer overflow in dns_srv and dns_naptr functions when handling malicious input. A remote attacker can supply a specially crafted DNS SRV or NAPTR response, trigger segfault and cause the service to crash.
Remediation
Install update from vendor's website.
References
- https://git.alpinelinux.org/aports/commit/?id=fd0aefe7beb083e683ebb7f904469d01e2b71f16
- https://git.alpinelinux.org/aports/commit/?id=b8ed9736efcaee1cfb71d1c71773d8e62ee169d8
- https://git.alpinelinux.org/aports/commit/?id=de555bb30f216410e565ff8c6e8983703d16d648
- https://git.alpinelinux.org/aports/commit/?id=3037ceeb75de0f253b86db6e56d7e28eeb95cbf6
- https://git.alpinelinux.org/aports/commit/?id=d4f71b2cd087e99656c7404cd15985a5f5162472